This patch fixes a possible buffer overrun problem in crypto perf test.
Previously when user configured aad size is over 12 bytes the copy of template 
aad will cause a buffer overrun.
The problem is fixed by only copy up to 12 bytes of aad template.

Fixes: 8a5b494a7f99 ("app/test-crypto-perf: add AEAD parameters")
Cc: pablo.de.lara.gua...@intel.com

Signed-off-by: Przemyslaw Zegan <przemyslawx.ze...@intel.com>
---
v3:
- replaced hardcoded values by sizeof(aad)

 app/test-crypto-perf/cperf_test_vectors.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/app/test-crypto-perf/cperf_test_vectors.c 
b/app/test-crypto-perf/cperf_test_vectors.c
index 2c7e314ec8..271e91c13c 100644
--- a/app/test-crypto-perf/cperf_test_vectors.c
+++ b/app/test-crypto-perf/cperf_test_vectors.c
@@ -555,8 +555,8 @@ cperf_test_vector_get_dummy(struct cperf_options *options)
                                return NULL;
                        }
 
-                       if(options->aead_aad_sz > 12)
-                               options->aead_aad_sz = 12;
+                       if(options->aead_aad_sz > sizeof(aad))
+                               options->aead_aad_sz = sizeof(aad);
 
                        memcpy(t_vec->aad.data, aad, options->aead_aad_sz);
                        t_vec->aad.phys_addr = 
rte_malloc_virt2iova(t_vec->aad.data);
-- 
2.30.2

Reply via email to